asthma 发表于 2025-3-27 00:20:44
The Search for the Holy Grail in Quantum Cryptography,ic principles of quantum mechanics. The scheme allows two parties, Alice and Bob, sharing no secret information in the first place, to exchange messages that nobody else can figure out. The only requirement is a quantum channel and a normal phone line connecting the two parties. The fact that quantu商店街 发表于 2025-3-27 02:53:38
Unconditional Security in Cryptography,earch for schemes with unconditional security. The corresponding proofs however must be based on information theory rather than complexity theory. One reason for this is the lack of known lower bounds on the running time of algorithms solving certain computational problems such as the discrete-logarDiaphragm 发表于 2025-3-27 07:28:55
http://reply.papertrans.cn/59/5835/583494/583494_33.pngCommentary 发表于 2025-3-27 13:15:02
Lectures on Data Security978-3-540-48969-6Series ISSN 0302-9743 Series E-ISSN 1611-3349ETCH 发表于 2025-3-27 17:11:05
0302-9743 Overview: Up-to-date survey of the state of the art in modern cryptology.Includes supplementary material: 978-3-540-65757-6978-3-540-48969-6Series ISSN 0302-9743 Series E-ISSN 1611-3349colony 发表于 2025-3-27 17:49:51
https://doi.org/10.1007/3-540-48969-XStandards; Zero-Knowledge; cryptoanalysis; cryptography; cryptology; data security; digital payment system共同给与 发表于 2025-3-28 00:16:13
http://reply.papertrans.cn/59/5835/583494/583494_37.pngThyroxine 发表于 2025-3-28 05:32:55
Lecture Notes in Computer Sciencehttp://image.papertrans.cn/l/image/583494.jpg无思维能力 发表于 2025-3-28 08:36:43
Emerging Standards for Public-Key Cryptography, specified. Public-key cryptography, now in its third decade, is in the midst of such a transition. With an introduction to the P1363 project ., this survey highlights some of the transitional challenges, and also describes several areas for further research motivated by the standards efforts.钻孔 发表于 2025-3-28 14:07:45
Commitment Schemes and Zero-Knowledge Protocols,This article is an introduction to two fundamental primitives in cryptographic protocol theory: commitment schemes and zero-knowledge protocols, and a survey of some new and old results on their existence and the connection between them.